Wednesday, May 13, 2009

The regional, cultural and national differences of identity management

Identity management theory is pretty much the same the whole world over, the differences lie in the practice, or implementation
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by CDW
rule

Threat Control & Containment
A proactive approach can lead to more mobile network security plus peace of mind. In this timely whitepaper read how a security solution can be specifically geared to the mobile components of your network. Learn More!

rule

Spotlight Story
The regional, cultural and national differences of identity management

Dave Kearns By Dave Kearns
Last week's European Identity Conference was, as always, a wonderful look at not only European advances in identity management, but what's happening worldwide. I had the opportunity to host panel discussions that included people from Germany, Holland, Sweden, Norway, France, Italy, the U.K., Belgium, Canada, the U.S., Australia and India. It's a wonderful way to discover that although identity management theory is pretty much the same the whole world over, the practice, or implementation, of that theory has many regional, cultural and national differences. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Fraud fighting service Next month at the European Identity Conference I'll be talking about Risk Management ("Risk Management for Better Health, Fiscal and Physical"). In doing some research for that keynote, I came across a company which ...

'Managing' passwords doesn't make them less unsafe In his newsletter last week my colleague M.E. Kabay points us to a draft release of a new paper from the National Institute of Standards and Technology (NIST) called the "Guide to enterprise password management." Maybe next they'll draft guidelines for the proper use of buggy whips!

The feeling of greater security tempts us to be more reckless The recent newsletter - rant, really - about the National Institute of Standards and Technology (NIST) white paper on enterprise password management ('Managing' passwords doesn't make them less unsafe) elicited a number of comments, some not very complimentary.

Give users passwords they don't have to remember In the last issue we were talking about username/password technology for modern networks and how to "manage" them. My suggestion was to manage to boot the technology out the door.

Putting Context in Identity I had a wonderful time at last week's 2nd annual European Identity Conference in Munich. Martin Kuppinger and his crew at Kuppinger Cole + Partner for putting on an excellent conference, one which I highly recommend you ...

Building an Identity Bus, Part 1 One of the most interesting "panel discussions" I had at the European Identity Conference didn't have anyone in the audience. Kuppinger & Cole senior analyst Felix Gaehtgens gathered Microsoft's Kim Cameron, Quest's ...

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by CDW
rule

Threat Control & Containment
A proactive approach can lead to more mobile network security plus peace of mind. In this timely whitepaper read how a security solution can be specifically geared to the mobile components of your network. Learn More!

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

05/13/09

Today's most-read stories:

  1. Microsoft: Corporate Vista testers should switch to Win 7 RC
  2. Inside a data leak audit
  3. PoE without the PoE switch
  4. Implications of proposed Cybersecurity Act of 2009, Part 1
  5. Windows Mobile 6.5: me-too all over the place
  6. Purported BlackBerry 'Onyx' photos surface
  7. Data center 10G whets switching companies' appetites
  8. Cloud security demands greater scrutiny, Forrester says
  9. 4chan users trigger DDoS attack ... on 4chan
  10. Bill would turn Internet flamers into felons


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment